Solved

what is the difference between in role seize and role transfer and how we can perform this task?

Posted on 2009-04-04
3
1,174 Views
Last Modified: 2012-05-06
what is the difference between in role seize and role transfer and how can we  perform these task?
Can you explain step by step.
0
Comment
Question by:chandar_bhandari
3 Comments
 
LVL 3

Expert Comment

by:kchat
Comment Utility
0
 
LVL 58

Accepted Solution

by:
tigermatt earned 500 total points
Comment Utility

FSMO roles are one of the fundamental components of Active Directory; the define five (5) operations which can only ever be performed at one DC at any one time. With the exception of these roles, Active Directory for the most part is multi-master and any action can be taken against any DC.

An FSMO role TRANSFER is the graceful movement of the roles from a live, working DC to another live DC. This could be performed in any situation - such as if you build a new DC and wish to migrate Active Directory over, or for any other reason. During the process, the current DC holding the role(s) is updated, so it becomes aware it is no longer the role holder.

An FSMO role SEIZE is when a DC holding one (or more) roles has failed and will never return to the network. The roles need to be re-located to a live, working DC. A transfer operation will not succeed because the old DC is not contactable; the roles must therefore be forcefully seized. In other words, it's a transfer operation, but the old DC is never notified the role holders have changed.

If you perform a seizure of the FSMO roles from a DC, you need to ensure two things: the current holder is actually dead and offline, and that the old DC will NEVER return to the network. If you do an FSMO role Seize and then bring the previous holder back online, you'll have a problem.

-Matt
0
 

Author Comment

by:chandar_bhandari
Comment Utility
thanks .. Matt
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

The canonical version of this article is on my web site here: http://iconoun.com/articles/collisions/ A companion presentation is available here: http://iconoun.com/articles/collisions/Unicode_Presentation.pdf
Technology opened people to different means of presenting information, but PowerPoint remains to be above competition. Know why PPT still works today.
The viewer will learn how to use the =DISCRINV command to create a discrete random variable, use this command to model a set of probabilities and outcomes in a Monte Carlo simulation, and learn how to find the standard deviation of a set of probabil…
The viewer will learn how to create a normally distributed random variable in Excel, use a normal distribution to simulate the return on an investment over a period of years, Create a Monte Carlo simulation using a normal random variable, and calcul…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now